{"id":1302,"date":"2024-06-25T09:44:59","date_gmt":"2024-06-25T12:44:59","guid":{"rendered":"https:\/\/blog.cantalupe.com.ar\/?p=1302"},"modified":"2024-10-23T18:03:12","modified_gmt":"2024-10-23T21:03:12","slug":"como-detectar-y-evitar-el-phishing","status":"publish","type":"post","link":"https:\/\/blog.cantalupe.com.ar\/en\/como-detectar-y-evitar-el-phishing\/","title":{"rendered":"How to detect and avoid phishing?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1302\" class=\"elementor elementor-1302\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-efc482f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"efc482f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a8c55f\" data-id=\"1a8c55f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a14ba19 elementor-widget elementor-widget-text-editor\" data-id=\"a14ba19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">La seguridad en l\u00ednea es una prioridad absoluta para cualquier negocio. Una de las amenazas m\u00e1s comunes y enga\u00f1osas que enfrentamos es el phishing. Esta pr\u00e1ctica maliciosa no solo puede comprometer la informaci\u00f3n confidencial de tu empresa, sino tambi\u00e9n da\u00f1ar la reputaci\u00f3n y afectar la confianza de tus clientes. Te contamos c\u00f3mo detectar y evitar el phishing!<\/span><\/p><h4 class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">What is phishing?<\/span><\/h4><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Phishing is a technique used by cybercriminals to obtain sensitive information such as passwords, credit card numbers, and other personal information. It is carried out through fake messages that appear legitimate, such as emails, text messages, or even phone calls. These messages often target employees or other individuals within an organization, pretending to be from trusted institutions like banks, service providers, or even colleagues.<\/span><\/p><h4 class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Warning signs<\/span><\/h4><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Identifying a phishing attempt can be challenging, but there are key warning signs that everyone in your company should know:<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Grammatical and spelling errors:<\/strong><\/b><span class=\"selectable-text copyable-text\">\u00a0Phishing emails or messages often contain obvious errors that distinguish them from legitimate professional communications.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Requests for personal information:<\/strong><\/b><span class=\"selectable-text copyable-text\">\u00a0Any request for sensitive information, such as passwords or account numbers, especially if it comes unexpectedly or urgently, should be treated with caution.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Suspicious URLs:<\/strong><\/b><span class=\"selectable-text copyable-text\"> Al hacer clic en un enlace, verifica la URL en la barra de direcciones. Los sitios web de phishing a menudo imitan los sitios leg\u00edtimos, pero la URL puede ser ligeramente diferente (por ejemplo, www.cantalupe-seguro.com.ar en lugar de<a href=\"https:\/\/www.cantalupe.com.ar\/\"> www.cantalupe.com.ar<\/a>)<\/span><\/p><h4 class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Real-world examples of phishing<\/span><\/h4><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Imagine one of your employees receives an email that appears to come from your cloud service provider. It asks them to click on a link to update their account information, but the URL of the link is suspicious and does not match the provider's official domain. This is a classic example of phishing aimed at obtaining access credentials to business systems.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Another common scenario is receiving a social media message promising an unbelievably good offer from a known supplier, but the link leads to a fake website designed to collect personal information from unsuspecting users.<\/span><\/p><h4 class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Protecting your business<\/span><\/h4><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">The best defense against phishing is education and constant vigilance. Here are some recommended practices to protect your business:<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Regular training: <\/strong><\/b><span class=\"selectable-text copyable-text\">Educate your employees about the risks of phishing and how to detect it. Conduct phishing simulations to teach them to recognize and avoid threats.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">URL verification: <\/strong><\/b><span class=\"selectable-text copyable-text\">Before clicking on a link, ensure you verify the legitimacy of the URL and that it matches the official company or service site.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Seguridad en capas:<\/strong><\/b><span class=\"selectable-text copyable-text\">\u00a0Implement layered security solutions such as firewalls, up-to-date antivirus software, and multi-factor authentication (MFA) to protect your systems and data.<\/span><\/p><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022<\/span><span class=\"selectable-text copyable-text\"> <\/span><b><strong class=\"selectable-text copyable-text x117nqv4\">Pol\u00edticas de seguridad:<\/strong><\/b><span class=\"selectable-text copyable-text\">\u00a0Establish clear policies on handling confidential information and responding to security incidents.<\/span><\/p><p dir=\"ltr\"><span class=\"selectable-text copyable-text x1sdyfia x1ncwhqj xd4r4e8 x1n8ftqi\" data-plain-text=\"*\">\u2022 <\/span><strong>Keeping technology up-to-date:<\/strong> Hackers typically exploit known vulnerabilities in systems to find a gateway to upload malicious code. Once they find it, they can access the system without permission and upload all kinds of content. Therefore, it's crucial to keep the technology you use up-to-date (PHP versions, databases, WordPress, plugins, etc.).<\/p><h4 class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Conclusion<\/span><\/h4><p class=\"selectable-text copyable-text x15bjb6t x1n2onr6\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Phishing is a persistent and sophisticated threat that every business must take seriously. By educating your employees, implementing robust security measures, and maintaining constant vigilance, you can protect your company against these cyber threats. Remember, online security is an ongoing, collaborative effort that requires constant attention to keep your data and customer trust secure.<\/span><\/p><p>Para mitigar los problemas de hackeo, ofrecemos servicios de mantenimiento preventivo que ayudan a mantener seguros tus sistemas y datos.<a href=\"https:\/\/cantalupe.com.ar\/contacto\"> \u00a1Cont\u00e1ctanos hoy mismo para conocer m\u00e1s y proteger tu negocio contra el phishing!<\/a><\/p><p dir=\"ltr\"><a href=\"https:\/\/www.cantalupe.com.ar\/\"><span class=\"selectable-text copyable-text\"><\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La seguridad en l\u00ednea es una prioridad absoluta para cualquier negocio. Una de las amenazas m\u00e1s comunes y enga\u00f1osas que enfrentamos es el phishing. Esta pr\u00e1ctica maliciosa no solo puede comprometer la informaci\u00f3n confidencial de tu empresa, sino tambi\u00e9n da\u00f1ar la reputaci\u00f3n y afectar la confianza de tus clientes. En [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[119,1],"tags":[309,304,293,295,302,299,307,294,297,311,296,135,310,313,312,306,133,298,303,308,300,301,305],"class_list":["post-1302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","category-tecnologia","tag-autenticacion-de-multiples-factores-mfa","tag-capacitacion-de-empleados","tag-ciberdelincuentes","tag-correos-electronicos-falsos","tag-ejemplos-de-phishing","tag-errores-gramaticales-y-ortograficos","tag-firewalls","tag-informacion-confidencial","tag-llamadas-telefonicas-falsas","tag-manejo-de-informacion-confidencial","tag-mensajes-de-texto-falsos","tag-phishing","tag-politicas-de-seguridad","tag-proteccion-contra-amenazas-ciberneticas","tag-respuesta-a-incidentes-de-seguridad","tag-seguridad-en-capas","tag-seguridad-en-linea","tag-senales-de-alerta","tag-simulaciones-de-phishing","tag-software-antivirus","tag-solicitudes-de-informacion-personal","tag-urls-sospechosas","tag-verificacion-de-urls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u00bfC\u00f3mo detectar y evitar el phishing? - Cantalupe Blog<\/title>\n<meta name=\"description\" content=\"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cantalupe.com.ar\/en\/como-detectar-y-evitar-el-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo detectar y evitar el phishing?\" \/>\n<meta property=\"og:description\" content=\"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cantalupe.com.ar\/en\/como-detectar-y-evitar-el-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cantalupe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-25T12:44:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-23T21:03:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"cantalupe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cantalupe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/\"},\"author\":{\"name\":\"cantalupe\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/person\\\/6f3ec15d039f6bfd8dd1e7e6f689bb0e\"},\"headline\":\"\u00bfC\u00f3mo detectar y evitar el phishing?\",\"datePublished\":\"2024-06-25T12:44:59+00:00\",\"dateModified\":\"2024-10-23T21:03:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/\"},\"wordCount\":733,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp\",\"keywords\":[\"autenticaci\u00f3n de m\u00faltiples factores (MFA)\",\"capacitaci\u00f3n de empleados\",\"ciberdelincuentes\",\"correos electr\u00f3nicos falsos\",\"ejemplos de phishing\",\"errores gramaticales y ortogr\u00e1ficos\",\"firewalls\",\"informaci\u00f3n confidencial\",\"llamadas telef\u00f3nicas falsas\",\"manejo de informaci\u00f3n confidencial\",\"mensajes de texto falsos\",\"phishing\",\"pol\u00edticas de seguridad\",\"protecci\u00f3n contra amenazas cibern\u00e9ticas\",\"respuesta a incidentes de seguridad\",\"seguridad en capas\",\"seguridad en l\u00ednea\",\"se\u00f1ales de alerta\",\"simulaciones de phishing\",\"software antivirus\",\"solicitudes de informaci\u00f3n personal\",\"URLs sospechosas\",\"verificaci\u00f3n de URLs\"],\"articleSection\":[\"Seguridad\",\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/\",\"name\":\"\u00bfC\u00f3mo detectar y evitar el phishing? - Cantalupe Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp\",\"datePublished\":\"2024-06-25T12:44:59+00:00\",\"dateModified\":\"2024-10-23T21:03:12+00:00\",\"description\":\"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp\",\"contentUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp\",\"width\":1792,\"height\":1024,\"caption\":\"\u00bfC\u00f3mo detectar y evitar el phishing?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/como-detectar-y-evitar-el-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo detectar y evitar el phishing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#website\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\",\"name\":\"Cantalupe Blog\",\"description\":\"Tecnolog\u00eda que Potencia Empresas\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\",\"name\":\"Cantalupe Blog\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logoCantalupe.jpeg\",\"contentUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logoCantalupe.jpeg\",\"width\":1364,\"height\":266,\"caption\":\"Cantalupe Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/agenciacantalupe\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/person\\\/6f3ec15d039f6bfd8dd1e7e6f689bb0e\",\"name\":\"cantalupe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"caption\":\"cantalupe\"},\"sameAs\":[\"http:\\\/\\\/blog.cantalupe.com.ar\"],\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/en\\\/author\\\/cantalupe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo detectar y evitar el phishing? - Cantalupe Blog","description":"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cantalupe.com.ar\/en\/como-detectar-y-evitar-el-phishing\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfC\u00f3mo detectar y evitar el phishing?","og_description":"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n","og_url":"https:\/\/blog.cantalupe.com.ar\/en\/como-detectar-y-evitar-el-phishing\/","og_site_name":"Cantalupe Blog","article_published_time":"2024-06-25T12:44:59+00:00","article_modified_time":"2024-10-23T21:03:12+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp","type":"image\/webp"}],"author":"cantalupe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cantalupe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#article","isPartOf":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/"},"author":{"name":"cantalupe","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/person\/6f3ec15d039f6bfd8dd1e7e6f689bb0e"},"headline":"\u00bfC\u00f3mo detectar y evitar el phishing?","datePublished":"2024-06-25T12:44:59+00:00","dateModified":"2024-10-23T21:03:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/"},"wordCount":733,"commentCount":0,"publisher":{"@id":"https:\/\/blog.cantalupe.com.ar\/#organization"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp","keywords":["autenticaci\u00f3n de m\u00faltiples factores (MFA)","capacitaci\u00f3n de empleados","ciberdelincuentes","correos electr\u00f3nicos falsos","ejemplos de phishing","errores gramaticales y ortogr\u00e1ficos","firewalls","informaci\u00f3n confidencial","llamadas telef\u00f3nicas falsas","manejo de informaci\u00f3n confidencial","mensajes de texto falsos","phishing","pol\u00edticas de seguridad","protecci\u00f3n contra amenazas cibern\u00e9ticas","respuesta a incidentes de seguridad","seguridad en capas","seguridad en l\u00ednea","se\u00f1ales de alerta","simulaciones de phishing","software antivirus","solicitudes de informaci\u00f3n personal","URLs sospechosas","verificaci\u00f3n de URLs"],"articleSection":["Seguridad","Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/","url":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/","name":"\u00bfC\u00f3mo detectar y evitar el phishing? - Cantalupe Blog","isPartOf":{"@id":"https:\/\/blog.cantalupe.com.ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#primaryimage"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp","datePublished":"2024-06-25T12:44:59+00:00","dateModified":"2024-10-23T21:03:12+00:00","description":"Describr\u00ed mas sobre el phishing, la pr\u00e1ctica maliciosa que compromete la informaci\u00f3n confidencial de tu empresa y tambien da\u00f1ar la reputaci\u00f3n","breadcrumb":{"@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#primaryimage","url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp","contentUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/06\/DALL\u00b7E-2024-06-25-09.39.24-A-conceptual-image-representing-phishing-in-a-business-environment.-At-the-center-an-employee-is-attentively-looking-at-his-laptop-with-a-doubtful-e.webp","width":1792,"height":1024,"caption":"\u00bfC\u00f3mo detectar y evitar el phishing?"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cantalupe.com.ar\/como-detectar-y-evitar-el-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blog.cantalupe.com.ar\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo detectar y evitar el phishing?"}]},{"@type":"WebSite","@id":"https:\/\/blog.cantalupe.com.ar\/#website","url":"https:\/\/blog.cantalupe.com.ar\/","name":"Cantalupe Blog","description":"Technology that Empowers Businesses","publisher":{"@id":"https:\/\/blog.cantalupe.com.ar\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cantalupe.com.ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cantalupe.com.ar\/#organization","name":"Cantalupe Blog","url":"https:\/\/blog.cantalupe.com.ar\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2023\/02\/logoCantalupe.jpeg","contentUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2023\/02\/logoCantalupe.jpeg","width":1364,"height":266,"caption":"Cantalupe Blog"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/agenciacantalupe\/"]},{"@type":"Person","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/person\/6f3ec15d039f6bfd8dd1e7e6f689bb0e","name":"cantalupe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","caption":"cantalupe"},"sameAs":["http:\/\/blog.cantalupe.com.ar"],"url":"https:\/\/blog.cantalupe.com.ar\/en\/author\/cantalupe\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/comments?post=1302"}],"version-history":[{"count":21,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1302\/revisions"}],"predecessor-version":[{"id":1444,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1302\/revisions\/1444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/media\/1305"}],"wp:attachment":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/media?parent=1302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/categories?post=1302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/tags?post=1302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}